Skip to content
View tblevins462's full-sized avatar

Block or report tblevins462

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
tblevins462/README.md

Hi, I'm Tyler

I'm an IT professional transitioning from a long career in hospitality into cybersecurity and cloud engineering. The parts of hospitality I loved most — solving problems under pressure, helping people, staying adaptable, and learning constantly — are the same strengths that now drive my work in technology.

What I'm Working On

I'm building a strong foundation across:

  • Cybersecurity fundamentals
  • AWS Cloud Practitioner
  • Azure administration
  • Detection engineering
  • Incident response
  • Penetration testing basics

As I learn more, I want to grow into cloud environments and eventually become a cloud engineer or cloud architect. I’m committed to continuous learning, and every project I take on is another step toward that goal.

Why This Field Matters to Me

Cybersecurity and cloud engineering reward curiosity, discipline, and the ability to think clearly under pressure. These qualities shaped my hospitality career, and now they shape my path in tech. I enjoy understanding how systems work, how they break, and how to protect them.

Outside of Tech

When I’m not studying or building projects, I stay active. I enjoy training for triathlons, hiking, and spending time outdoors with my dog. Fitness keeps me focused, grounded, and disciplined — qualities that carry directly into my work and learning.

Featured Projects

A few of the projects I’m most proud of:

  • Incident Triage Investigation – End-to-end SOC-style investigation with log analysis, OSINT, and MITRE mapping
  • Detection Engineering (Sysmon + Wazuh) – Telemetry tuning, noise reduction, and alert fidelity improvements
  • Penetration Testing Lab – Reconnaissance, enumeration, exploitation, and reporting workflow

These projects are pinned below.

Portfolio

All of my project documentation, reports, and labs are organized here:
https://drive.google.com/drive/folders/17rwnVNGlFvpDalxiIIbUh1Gd3EaBW1LW

Connect With Me

LinkedIn: https://www.linkedin.com/in/tylerblevins/
Email: tblevins462@gmail.com

Pinned Loading

  1. aws-secure-vpc-lab aws-secure-vpc-lab Public

    A professionally documented AWS home lab demonstrating secure VPC design with public/private subnets, NAT, bastion host access, routing, and cloud architecture best practices.

  2. sysmon-wazuh-detection-engineering sysmon-wazuh-detection-engineering Public

    Detection engineering project focused on Sysmon tuning, noise reduction, and integrating endpoint telemetry into Splunk to improve visibility and alert fidelity.

  3. incident-triage-investigation incident-triage-investigation Public

    Full SOC-style investigation including alert validation, log correlation, OSINT enrichment, MITRE mapping, and a final incident report demonstrating real-world triage and analysis skills.

  4. penetration-testing-vulnerability-assessment penetration-testing-vulnerability-assessment Public

    Structured penetration test covering reconnaissance, enumeration, exploitation, and reporting, highlighting attacker methodology and actionable remediation guidance.